Resubmissions

09/04/2024, 09:28 UTC

240409-lfj78aeh9x 1

09/04/2024, 09:24 UTC

240409-lc2yvsbf37 4

Analysis

  • max time kernel
    206s
  • max time network
    205s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/04/2024, 09:24 UTC

General

  • Target

    https://api.getpxlemal.com?id=11541916&stepNo=1

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 4 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://api.getpxlemal.com?id=11541916&stepNo=1
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe0,0x104,0x108,0xb8,0x10c,0x7ffc4d709758,0x7ffc4d709768,0x7ffc4d709778
      2⤵
        PID:4648
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:2
        2⤵
          PID:4880
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:8
          2⤵
            PID:1452
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:8
            2⤵
              PID:4704
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:1
              2⤵
                PID:4008
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:1
                2⤵
                  PID:828
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:8
                  2⤵
                    PID:2456
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:8
                    2⤵
                    • NTFS ADS
                    PID:2140
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:8
                    2⤵
                      PID:1164
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4412 --field-trial-handle=1812,i,10607418705779434098,4781281359446077480,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:248
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:2208
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:3364
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Modifies registry class
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of SetWindowsHookEx
                        PID:2420
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:1544
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:1420
                      • C:\Windows\system32\NOTEPAD.EXE
                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\NewCompare.txt
                        1⤵
                        • Opens file in notepad (likely ransom note)
                        PID:3424
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                        1⤵
                          PID:456
                        • C:\Windows\System32\oobe\UserOOBEBroker.exe
                          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                          1⤵
                          • Drops file in Windows directory
                          PID:4724
                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                          1⤵
                            PID:3936
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                              PID:404
                            • C:\Users\Admin\AppData\Local\Temp\C56EEDC6-8D0B-4B61-99CB-EFCB671AE5E3\dismhost.exe
                              C:\Users\Admin\AppData\Local\Temp\C56EEDC6-8D0B-4B61-99CB-EFCB671AE5E3\dismhost.exe {39058A14-BA7C-4125-8E93-BD043A5FDF22}
                              1⤵
                              • Drops file in Windows directory
                              PID:4968
                            • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
                              "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /n "C:\Users\Admin\Desktop\UnlockSend.potm"
                              1⤵
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious use of SetWindowsHookEx
                              PID:3112

                            Network

                            • flag-us
                              DNS
                              api.getpxlemal.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              api.getpxlemal.com
                              IN A
                              Response
                              api.getpxlemal.com
                              IN A
                              172.67.185.224
                              api.getpxlemal.com
                              IN A
                              104.21.48.115
                            • flag-us
                              DNS
                              224.185.67.172.in-addr.arpa
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              224.185.67.172.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              43.229.111.52.in-addr.arpa
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              43.229.111.52.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              ctldl.windowsupdate.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              ctldl.windowsupdate.com
                              IN A
                              Response
                              ctldl.windowsupdate.com
                              IN CNAME
                              wu-bg-shim.trafficmanager.net
                              wu-bg-shim.trafficmanager.net
                              IN CNAME
                              download.windowsupdate.com.edgesuite.net
                              download.windowsupdate.com.edgesuite.net
                              IN CNAME
                              a767.dspw65.akamai.net
                              a767.dspw65.akamai.net
                              IN A
                              2.17.197.241
                              a767.dspw65.akamai.net
                              IN A
                              2.17.197.240
                            • flag-us
                              DNS
                              r.bing.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              r.bing.com
                              IN A
                              Response
                              r.bing.com
                              IN CNAME
                              p-static.bing.trafficmanager.net
                              p-static.bing.trafficmanager.net
                              IN CNAME
                              r.bing.com.edgekey.net
                              r.bing.com.edgekey.net
                              IN CNAME
                              e86303.dscx.akamaiedge.net
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.99
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.129
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.97
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.152
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.57
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.72
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.75
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.106
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.113
                            • flag-us
                              DNS
                              175.117.168.52.in-addr.arpa
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              175.117.168.52.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              fp.msedge.net
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              fp.msedge.net
                              IN A
                              Response
                              fp.msedge.net
                              IN CNAME
                              1.perf.msedge.net
                              1.perf.msedge.net
                              IN CNAME
                              a-0019.a-msedge.net
                              a-0019.a-msedge.net
                              IN CNAME
                              a-0019.a.dns.azurefd.net
                              a-0019.a.dns.azurefd.net
                              IN CNAME
                              a-0019.standard.a-msedge.net
                              a-0019.standard.a-msedge.net
                              IN A
                              204.79.197.222
                            • flag-us
                              DNS
                              arc.msn.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              arc.msn.com
                              IN A
                              Response
                              arc.msn.com
                              IN CNAME
                              arc.trafficmanager.net
                              arc.trafficmanager.net
                              IN CNAME
                              iris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.com
                              iris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.com
                              IN A
                              20.223.36.55
                            • flag-us
                              DNS
                              www.bing.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              www.bing.com
                              IN A
                              Response
                              www.bing.com
                              IN CNAME
                              www-www.bing.com.trafficmanager.net
                              www-www.bing.com.trafficmanager.net
                              IN CNAME
                              www.bing.com.edgekey.net
                              www.bing.com.edgekey.net
                              IN CNAME
                              e86303.dscx.akamaiedge.net
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.75
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.121
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.72
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.97
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.113
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.194
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.99
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.129
                              e86303.dscx.akamaiedge.net
                              IN A
                              23.62.61.106
                            • flag-us
                              DNS
                              114.66.68.104.in-addr.arpa
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              114.66.68.104.in-addr.arpa
                              IN PTR
                              Response
                              114.66.68.104.in-addr.arpa
                              IN PTR
                              a104-68-66-114deploystaticakamaitechnologiescom
                            • flag-us
                              DNS
                              67.112.168.52.in-addr.arpa
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              67.112.168.52.in-addr.arpa
                              IN PTR
                              Response
                            • flag-us
                              DNS
                              officeclient.microsoft.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              officeclient.microsoft.com
                              IN A
                              Response
                              officeclient.microsoft.com
                              IN CNAME
                              config.officeapps.live.com
                              config.officeapps.live.com
                              IN CNAME
                              prod.configsvc1.live.com.akadns.net
                              prod.configsvc1.live.com.akadns.net
                              IN CNAME
                              europe.configsvc1.live.com.akadns.net
                              europe.configsvc1.live.com.akadns.net
                              IN CNAME
                              ukw-azsc-config.officeapps.live.com
                              ukw-azsc-config.officeapps.live.com
                              IN A
                              52.109.32.97
                            • flag-us
                              DNS
                              nexusrules.officeapps.live.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              nexusrules.officeapps.live.com
                              IN A
                              Response
                              nexusrules.officeapps.live.com
                              IN CNAME
                              prod.nexusrules.live.com.akadns.net
                              prod.nexusrules.live.com.akadns.net
                              IN A
                              52.111.229.43
                            • flag-us
                              DNS
                              ctldl.windowsupdate.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              ctldl.windowsupdate.com
                              IN A
                              Response
                              ctldl.windowsupdate.com
                              IN CNAME
                              wu-bg-shim.trafficmanager.net
                              wu-bg-shim.trafficmanager.net
                              IN CNAME
                              bg.microsoft.map.fastly.net
                              bg.microsoft.map.fastly.net
                              IN A
                              199.232.210.172
                              bg.microsoft.map.fastly.net
                              IN A
                              199.232.214.172
                            • flag-us
                              DNS
                              login.live.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              login.live.com
                              IN A
                              Response
                              login.live.com
                              IN CNAME
                              login.msa.msidentity.com
                              login.msa.msidentity.com
                              IN CNAME
                              www.tm.lg.prod.aadmsa.trafficmanager.net
                              www.tm.lg.prod.aadmsa.trafficmanager.net
                              IN CNAME
                              prdv4a.aadg.msidentity.com
                              prdv4a.aadg.msidentity.com
                              IN CNAME
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              20.190.159.0
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              20.190.159.23
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              20.190.159.4
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              40.126.31.67
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              20.190.159.73
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              40.126.31.69
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              20.190.159.75
                              www.tm.v4.a.prd.aadg.trafficmanager.net
                              IN A
                              20.190.159.68
                            • flag-us
                              DNS
                              self.events.data.microsoft.com
                              chrome.exe
                              Remote address:
                              8.8.8.8:53
                              Request
                              self.events.data.microsoft.com
                              IN A
                              Response
                              self.events.data.microsoft.com
                              IN CNAME
                              self-events-data.trafficmanager.net
                              self-events-data.trafficmanager.net
                              IN CNAME
                              onedscolprdcus16.centralus.cloudapp.azure.com
                              onedscolprdcus16.centralus.cloudapp.azure.com
                              IN A
                              52.182.143.213
                            • flag-us
                              GET
                              https://api.getpxlemal.com/?id=11541916&stepNo=1
                              chrome.exe
                              Remote address:
                              172.67.185.224:443
                              Request
                              GET /?id=11541916&stepNo=1 HTTP/2.0
                              host: api.getpxlemal.com
                              sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
                              sec-ch-ua-mobile: ?0
                              sec-ch-ua-platform: "Windows"
                              upgrade-insecure-requests: 1
                              user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                              accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
                              sec-fetch-site: none
                              sec-fetch-mode: navigate
                              sec-fetch-user: ?1
                              sec-fetch-dest: document
                              accept-encoding: gzip, deflate, br
                              accept-language: en-US,en;q=0.9
                              Response
                              HTTP/2.0 200
                              date: Tue, 09 Apr 2024 09:24:25 GMT
                              content-type: application/octet-stream
                              content-length: 95
                              access-control-allow-origin: *
                              content-security-policy: default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests
                              cross-origin-opener-policy: same-origin
                              cross-origin-resource-policy: same-origin
                              origin-agent-cluster: ?1
                              referrer-policy: no-referrer
                              strict-transport-security: max-age=15552000; includeSubDomains
                              x-content-type-options: nosniff
                              x-dns-prefetch-control: off
                              x-download-options: noopen
                              x-frame-options: SAMEORIGIN
                              x-permitted-cross-domain-policies: none
                              x-xss-protection: 0
                              etag: W/"5f-DsY7FAN0unBKWPoMdDyzV2gzE90"
                              cf-cache-status: DYNAMIC
                              report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cw%2Bwo%2B32SxUsuzgiCnQnpiSDRgHDN%2BiuCA3q8RJ1btWMgGAh46%2FrMybHWwYPuAarw5vAsVrijfPQ16kmeQZOntwoBITo8HC5MFNfcKshXwhkXpam%2BvTeSOfFl1vMhWBAt4y2Xuk%3D"}],"group":"cf-nel","max_age":604800}
                              nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              server: cloudflare
                              cf-ray: 871971a718e463fe-LHR
                              alt-svc: h3=":443"; ma=86400
                            • 172.67.185.224:443
                              https://api.getpxlemal.com/?id=11541916&stepNo=1
                              tls, http2
                              chrome.exe
                              1.9kB
                              6.6kB
                              15
                              15

                              HTTP Request

                              GET https://api.getpxlemal.com/?id=11541916&stepNo=1

                              HTTP Response

                              200
                            • 184.25.204.49:443
                              www.bing.com
                              tls
                              21.4kB
                              141.1kB
                              136
                              119
                            • 52.168.117.175:443
                              browser.pipe.aria.microsoft.com
                              tls
                              3.2kB
                              7.5kB
                              20
                              14
                            • 23.62.61.99:443
                              r.bing.com
                              tls
                              68.5kB
                              1.7MB
                              1302
                              1255
                            • 23.62.61.99:443
                              r.bing.com
                              tls
                              1.1kB
                              5.2kB
                              15
                              12
                            • 23.62.61.99:443
                              r.bing.com
                              tls
                              1.1kB
                              5.2kB
                              15
                              12
                            • 23.62.61.99:443
                              r.bing.com
                              tls
                              1.1kB
                              5.2kB
                              15
                              12
                            • 23.62.61.99:443
                              r.bing.com
                              tls
                              1.1kB
                              5.2kB
                              15
                              12
                            • 23.62.61.99:443
                              r.bing.com
                              tls
                              1.1kB
                              5.2kB
                              15
                              12
                            • 104.68.66.114:443
                              cxcs.microsoft.net
                              tls
                              1.7kB
                              7.7kB
                              23
                              18
                            • 23.62.61.75:443
                              www.bing.com
                              tls
                              3.0kB
                              7.5kB
                              24
                              16
                            • 8.8.8.8:53
                              api.getpxlemal.com
                              dns
                              chrome.exe
                              1.1kB
                              3.1kB
                              16
                              16

                              DNS Request

                              api.getpxlemal.com

                              DNS Response

                              172.67.185.224
                              104.21.48.115

                              DNS Request

                              224.185.67.172.in-addr.arpa

                              DNS Request

                              43.229.111.52.in-addr.arpa

                              DNS Request

                              ctldl.windowsupdate.com

                              DNS Response

                              2.17.197.241
                              2.17.197.240

                              DNS Request

                              r.bing.com

                              DNS Response

                              23.62.61.99
                              23.62.61.129
                              23.62.61.97
                              23.62.61.152
                              23.62.61.57
                              23.62.61.72
                              23.62.61.75
                              23.62.61.106
                              23.62.61.113

                              DNS Request

                              175.117.168.52.in-addr.arpa

                              DNS Request

                              fp.msedge.net

                              DNS Response

                              204.79.197.222

                              DNS Request

                              arc.msn.com

                              DNS Response

                              20.223.36.55

                              DNS Request

                              www.bing.com

                              DNS Response

                              23.62.61.75
                              23.62.61.121
                              23.62.61.72
                              23.62.61.97
                              23.62.61.113
                              23.62.61.194
                              23.62.61.99
                              23.62.61.129
                              23.62.61.106

                              DNS Request

                              114.66.68.104.in-addr.arpa

                              DNS Request

                              67.112.168.52.in-addr.arpa

                              DNS Request

                              officeclient.microsoft.com

                              DNS Response

                              52.109.32.97

                              DNS Request

                              nexusrules.officeapps.live.com

                              DNS Response

                              52.111.229.43

                              DNS Request

                              ctldl.windowsupdate.com

                              DNS Response

                              199.232.210.172
                              199.232.214.172

                              DNS Request

                              login.live.com

                              DNS Response

                              20.190.159.0
                              20.190.159.23
                              20.190.159.4
                              40.126.31.67
                              20.190.159.73
                              40.126.31.69
                              20.190.159.75
                              20.190.159.68

                              DNS Request

                              self.events.data.microsoft.com

                              DNS Response

                              52.182.143.213

                            • 224.0.0.251:5353
                              chrome.exe
                              204 B
                              3

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              871B

                              MD5

                              53f0692be1dceda45e8ed043ed8840a9

                              SHA1

                              e3686f925f5b4d52eda525934ad6280d790507ef

                              SHA256

                              db7c63f2527fb2fdc2083d9b21368b2833f63874accc341c8c939a96e3a272bb

                              SHA512

                              af7f7b4133b0432f60eda76d0ae6cfc232971a7055d720c84360fb130194e6ceb61389312064836ea1c756b61992882fc5b5ea44f2691a0620d9c7721777e6b5

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              538B

                              MD5

                              aa7de0e64180fb1fcd09fd4f1fd227b3

                              SHA1

                              2ce32bb9dd2d0691a61b94320820d237e981e2a9

                              SHA256

                              5e8f31813a90df2f0e01ef4e5b057b373b8f149231927177c09f73a9de53ce6d

                              SHA512

                              66a8ef96da1c848cb8b38be88f9d2510bf9fd648984b786a950ca9d6326a6d55322ed33b11513f227880534105cf46a5f2b80f7abdd66189c5217795095b53aa

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              c56452ca47e144ed8d6dd9f4951e5aad

                              SHA1

                              ac3b229fadac29d338be6b296aa3e1fd993a2e84

                              SHA256

                              0986c47d3ca450fbb38fd0489f14aad58fd7befca05b7de5a253258160404a35

                              SHA512

                              0246183346f17b6ab56a60cab5d1cdd35f7c65f9ffb2525a24336bd13e3c0f994805d90bc0f8d085fff6ea70972d3cf84f728aafabbfcab2ffc37d362a128090

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              710ff04a286427ebe85f8a227920a1aa

                              SHA1

                              8c2f384ce3e28839ed9a88e7bbcb436bcb62e9f8

                              SHA256

                              da746e0466c034c1dbdb29456d37055aef8552f0593254980e04f0f17b442d78

                              SHA512

                              d702d228287dbaaf60fa6757cf565c9354878c87e4435c1aa925a3f7054c63db3451693f1526807191b62452b54a57efadeb531961aa522dea15ea22e907eb9d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              130KB

                              MD5

                              092d23cc5822a84961124cd62f4495ae

                              SHA1

                              8ceae3a48623ed440ca24fbda43f5d29efc61342

                              SHA256

                              1d00ba3370ed296fb6e3eff1f036c89e8ca6a38c9bc18c61318d8fd752e1c494

                              SHA512

                              0a061819421cf928781593d71fff63c2f87ad03aa611fa016394c8a1c3d8f2c86406cc5f3ebe47198f9171e4cc07b08613cec3c109644250dd0694791f83be97

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                              Filesize

                              98KB

                              MD5

                              92a46ed9c92bf780bf8d5ce98d0f63c5

                              SHA1

                              195ad6bca561ab10d66f75609f073fd95b4f3238

                              SHA256

                              e187598a644370472c8f723a74facdbefccaa82c877968438dd988030c284ace

                              SHA512

                              b978c9909c5a827017dfe95ba336f714768f112034403c49a6d5c691372a7c703cb23ad73ce8819d7858fa5f0002b3486f2dd7a0c2eb4fbae3292c6197b98bb5

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe581cda.TMP

                              Filesize

                              93KB

                              MD5

                              0a0c5d3ea3c25eb2809269da5754ab0a

                              SHA1

                              ca512bcaafe05694e61d699db7cf82477d10503f

                              SHA256

                              93a8f4a3c783f57a39d9c1d9d321bada9069423fe8f843a84e39c0c2a9338a08

                              SHA512

                              737479b1755b36fd469e4ab712582c660d7a42cc05bdc779431e58cee9baf92da57d420940fb19f2bf86cc2767cfb648820abca0fd2a5ee493057d34323bd36a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                              Filesize

                              2B

                              MD5

                              99914b932bd37a50b983c5e7c90ae93b

                              SHA1

                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                              SHA256

                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                              SHA512

                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                            • C:\Users\Admin\Downloads\download:Zone.Identifier

                              Filesize

                              84B

                              MD5

                              ba7008d06d55882c8eacba61f536b80b

                              SHA1

                              7bfa9de8898fbada811028fe89e450731d9b8422

                              SHA256

                              12328f1e70db2d7808ec865e5ea39f4f9aa5b9b2daed28b8e60ac8efa7d6d657

                              SHA512

                              22f7e45d31b60484837f25473d7cf8419e357721e92b0df01fecff5436192ba757a88bb634e9cdfdc7d515b7a95bc275bf7e0744121b5f9dfa94c6b2c2bba682

                            • memory/3112-110-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-116-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-106-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-109-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-108-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-111-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-105-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-112-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-113-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-114-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-115-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-107-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-117-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-119-0x00007FFC19930000-0x00007FFC19940000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-118-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-120-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-121-0x00007FFC5C240000-0x00007FFC5C2FD000-memory.dmp

                              Filesize

                              756KB

                            • memory/3112-122-0x00007FFC19930000-0x00007FFC19940000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-135-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-136-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-137-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-138-0x00007FFC1C450000-0x00007FFC1C460000-memory.dmp

                              Filesize

                              64KB

                            • memory/3112-139-0x00007FFC5C3C0000-0x00007FFC5C5C9000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/3112-140-0x00007FFC5C240000-0x00007FFC5C2FD000-memory.dmp

                              Filesize

                              756KB

                            We care about your privacy.

                            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.